Results
| Paper | Avail. | Funct. | Repro. | Available At |
|---|---|---|---|---|
| "Your imaging may be stone-cold normal, but if they look sick, theyβre going to get admitted": An Investigation of Cliniciansβ Perceptions of Impact & Likelihood of Security Failures |
|
π¦ Artifact |
||
| 'Abuse Risks are Often Inherent to Product Features': Exploring AI Vendorsβ Bug Bounty and Responsible Disclosure Policies |
|
π¦ Artifact |
||
| A Distortion-minimization Watermarking Framework for Large Language Models: Larger Capacity, Stronger Robustness and Higher Quality |
|
π¦ Artifact |
||
| A Large-Scale Study of Personalized Phishing using Large Language Models |
|
π¦ Artifact |
||
| A Midsummer Memeβs Dream: Investigating Market Manipulations in the Meme Coin Ecosystem |
|
π¦ Artifact |
||
| ARM MTE Performance in Practice |
|
π¦ Artifact |
||
| Ajax: Fast Threshold Fully Homomorphic Encryption without Noise Flooding |
|
π¦ Artifact |
||
| Analyzing the WebRTC Ecosystem and Breaking Authentication in DTLS-SRTP |
|
π¦ Artifact |
||
| Anonymous Tokens with Designated-Reader Metadata Bit |
|
|
|
π¦ Artifact π Appendix |
| Arguzz: Testing zkVMs for Soundness and Completeness Bugs |
|
π¦ Artifact |
||
| Artifacts for BLE Theft Auto: Evaluating the Security of Aftermarket BLE-based Automotive Remote Control Systems |
|
π¦ Artifact |
||
| Assessing LLM Response Quality in the Context of Technology-Facilitated Abuse |
|
π¦ Artifact |
||
| Attacks on Approximate Caches in Text-to-Image Diffusion Models |
|
π¦ Artifact |
||
| Autonomy Comes with Costs: Detecting Denial-of-Service Vulnerabilities Caused by Resource Abusing in LLM-based Agents |
|
π¦ Artifact |
||
| B-Privacy: Defining and Enforcing Privacy in Weighted Voting |
|
π¦ Artifact |
||
| BADControl: Backdoor Attacks Against Control Systems |
|
π¦ Artifact |
||
| BatchBoot: Fast Batched Bootstrapping for TFHE scheme and Practical Applications |
|
π¦ Artifact |
||
| Behind Bars: A Side-Channel Attack on NVIDIA MIG Cache Partitioning Using Memory Barriers |
|
π¦ Artifact |
||
| Bridges to Self: Silent Web-to-App Tracking on Mobile via Localhost |
|
π¦ Artifact |
||
| Bridging Bitcoin to Second Layers via BitVM2 |
|
|
|
π¦ Artifact π Appendix |
| Bridging Usability and Performance: A Tensor Compiler for Autovectorizing Homomorphic Encryption |
|
|
|
π¦ Artifact π Appendix |
| Can we estimate privacy vulnerability of individual records? Towards Mitigating Attribute Inference Attacks on ML Models |
|
|
|
π¦ Artifact π Appendix |
| Chameleon Channels: Measuring YouTube Accounts Repurposed for Deception and Profit |
|
|
|
π¦ Artifact π Appendix |
| CombiSan: Unifying Software Sanitizers for Comprehensive Fuzzing |
|
|
|
π¦ Artifact π Appendix |
| CompLeak: Deep Learning Model Compression Exacerbates Privacy Leakage |
|
|
|
π¦ Artifacts: 1, 2 π Appendix |
| Concretely efficient blind signatures based on VOLE-in-the-head proofs and the MAYO trapdoor |
|
|
|
π¦ Artifact π Appendix |
| Cracking Federated Privacy: Initialization-Resilient Gradient Inversion with Fine-Grained Reconstruction |
|
π¦ Artifact |
||
| Cracks in the Walled Garden: Dissecting the Gray-Market of Unauthorized iOS App Distribution via Ad Hoc Sideloading |
|
π¦ Artifacts: 1, 2 |
||
| CuSafe: Capturing Memory Corruption on NVIDIA GPUs |
|
π¦ Artifact |
||
| Cutting the Gordian Knot: Detecting Malicious PyPI Packages via a Knowledge-Mining Framework |
|
π¦ Artifact |
||
| DDR-SSE: Duplicated Retrieval of Documents for System-wide Secure Searchable Symmetric Encryption |
|
|
|
π¦ Artifact π Appendix |
| DMGuard: Safeguarding Kernels from Physical-Page Use-After-Free Vulnerabilities |
|
|
|
π¦ Artifact π Appendix |
| DaLens: Charting DNS Self-Amplification Threats at Large |
|
π¦ Artifact |
||
| Differential Trust: Dynamic Multi-Authority Anonymous Credentials with Epoch-Weighted Updates |
|
π¦ Artifact |
||
| Digital Risks and Coping Practices among Roblox Game Creators |
|
π¦ Artifact |
||
| Distributed Synthesis of Differentially Private Tabular Datasets |
|
|
|
π¦ Artifact π Appendix |
| Distributed Vector Commitments and Their Applications |
|
π¦ Artifact |
||
| E2E-AKMA: An End-to-End Secure and Privacy-Enhancing AKMA Protocol Against the Anchor Function Compromise |
|
π¦ Artifact |
||
| Efficient Threshold ML-DSA |
|
π¦ Artifact |
||
| Efficient and High-Accuracy Secure Two-Party Protocols for a Class of Functions with Real-number Inputs |
|
π¦ Artifact |
||
| End-to-End Encrypted Collaborative Documents |
|
π¦ Artifact |
||
| Estimating the amount of script-generated traffic in a mixture |
|
π¦ Artifact |
||
| FABRICKED: Misconfiguring Infinity Fabric to Break AMD SEV-SNP |
|
π¦ Artifact |
||
| FABS: Fast Attribute-Based Signatures |
|
π¦ Artifact |
||
| FIRA: Enabling Automatic Forensic Investigation of Unmanned Aerial Vehicles |
|
|
|
π¦ Artifact π Appendix |
| Fend for Yourself! Backdoor Purification in Federated Graph Learning with an Evolving Knowledge Anchor |
|
|
|
π¦ Artifact π Appendix |
| FirmReBugger: A Benchmark Framework for Monolithic Firmware Fuzzers |
|
|
|
π¦ Artifact π Appendix |
| From Easy to Hard++: Promoting Differentially Private Image Synthesis Through Spatial-Frequency Curriculum |
|
|
π¦ Artifact π Appendix |
|
| From Mirai to Gorilla: Deep Dive into a Long-Lasting DDoS-for-Hire Botnet |
|
π¦ Artifact |
||
| From Texts to Rules: Generating Sigma Rules with Large Language Models from Cyber Threat Reports |
|
π¦ Artifact |
||
| Garuda and Pari: Faster and Smaller SNARKs via Equifficient Polynomial Commitments |
|
π¦ Artifact |
||
| HAMLOCK: HArdware-Model LOgically Combined attacK |
|
π¦ Artifact |
||
| Heli: Heavy-Light Private Aggregation |
|
|
|
π¦ Artifact π Appendix |
| Hop: A Modern Transport and Remote Access Protocol |
|
|
|
π¦ Artifact π Appendix |
| Hydrangea: Optimistic Two-Round Partial Synchrony with Improved Fault Resilience |
|
π¦ Artifact |
||
| Identifying Provenance of Generative Text-to-Image Models |
|
π¦ Artifact |
||
| Imitative Membership Inference Attack |
|
π¦ Artifact |
||
| Inconsistent, Incomplete, and Insecure: A Survey of Account Security Interfaces |
|
π¦ Artifact |
||
| Inference Attacks Against Graph Generative Diffusion Models |
|
π¦ Artifact |
||
| InstantOMR: Oblivious Message Retrieval with Low Latency and Optimal Parallelizability |
|
|
|
π¦ Artifact π Appendix |
| InstrSem: Automatically and Generically Inferring Semantics of (Undocumented) CPU Instructions |
|
|
|
π¦ Artifact π Appendix |
| Interpolation-Based Optimization for Enforcing lp-Norm Metric Differential Privacy in Continuous and Fine-Grained Domains |
|
|
|
π¦ Artifact π Appendix |
| Invariant-Guided Logical Testing of Open RAN Controllers |
|
π¦ Artifact |
||
| IoT Product Page Data |
|
π¦ Artifact |
||
| JailbreakScope: Interpreting Jailbreak Mechanism through Representation and Circuit Analyses |
|
π¦ Artifact |
||
| Jailbreaking the AMD Secure Processor: Enabling Live Analysis of SEV-SNPs Undocumented Security Boundaries |
|
π¦ Artifact |
||
| KernelRCA: Facilitating Root Cause Analysis of Memory Corruptions in Linux Kernel with Contextual Causality Chain |
|
|
|
π¦ Artifact π Appendix |
| Khost: KVM-based Near Native MCU Firmware Rehosting |
|
|
π¦ Artifact π Appendix |
|
| LPG: Raise Your Location Privacy Game in Direct-to-Cell LEO Satellite Networks |
|
|
π¦ Artifacts: 1, 2 π Appendix |
|
| Lethe: Purifying Backdoored Large Language Models with Knowledge Dilution |
|
π¦ Artifact |
||
| Leveraging Cryptographic Simulator Synthesis for Formally Verifying the FOO E-Voting Protocol -- Artifacts |
|
|
|
π¦ Artifact π Appendix |
| Libra: Pattern-Scheduling Co-Optimization for Cross-Scheme FHE Code Generation over GPGPU |
|
|
|
π¦ Artifact π Appendix |
| Logos: Robust Sharding Blockchain With Fast Processing and Optimal Cross-Shard Overhead |
|
π¦ Artifact |
||
| Lost in Blockchain Address Misuse: Hidden Cross-Platform Risks and Their Security Impact |
|
π¦ Artifact |
||
| Love, Lies, and Language Models: Investigating AIβs Role in Romance-Baiting Scams |
|
|
|
π¦ Artifact π Appendix |
| M-Step: A Single-Stepping Framework for Side-Channel Analysis on TrustZone-M |
|
|
|
π¦ Artifact π Appendix |
| MASLeak: Investigating and Exposing Intellectual Property Leakage Vulnerabilities in Multi-Agent Systems |
|
|||
| MULCOTAINT: Towards Efficient Multi-tag Dynamic Taint Analysis via Hardware/Software Co-design |
|
π¦ Artifact |
||
| Membership Inference Attacks on Tokenizers of Large Language Models |
|
|
|
π¦ Artifact π Appendix |
| Memclave: Secure In-Memory Enclave for Untrusted Hosts |
|
|
|
π¦ Artifact π Appendix |
| NOIR: Privacy-Preserving Generation of Code with Open-Source LLMs |
|
π¦ Artifact |
||
| Network-Level Prompt and Trait Leakage in Local Research Agents |
|
π¦ Artifact |
||
| Nudge: A Private Recommendations Engine |
|
π¦ Artifact |
||
| OS-Sanitizer: System-wide Latent Defect Inference in Linux Applications |
|
|
|
π¦ Artifact π Appendix |
| On Evaluating the Robustness of Large Vision-Language Models via Untargeted Modality Alignment Breaking Adversarial Attack |
|
π¦ Artifact |
||
| Opossum Attack: Application Layer Desynchronization using Opportunistic TLS |
|
π¦ Artifact |
||
| Overcoming the Retrieval Barrier: Indirect Prompt Injection in the Wild for LLM Systems |
|
π¦ Artifact |
||
| PANGOLIN: Fuzzing Multilingual IoT Firmware with LLM-Driven Code Analysis |
|
π¦ Artifact |
||
| PICS: Private Intersection over Committed (and reusable) Sets |
|
|
|
π¦ Artifact π Appendix |
| PROBE+DETECT+MITIGATE (PDM): Enabling Cloud Tenants to Self-Defend against Microarchitectural Attacks |
|
π¦ Artifact |
||
| Patch-Guided Vulnerability Detection: Extracting Java API Security Rules via AttackβDefense Cross-Analysis |
|
π¦ Artifact |
||
| PrivacyShield: Relaying BLE Beacons to Counter Unsolicited Tracking |
|
|
|
π¦ Artifact π Appendix |
| Provable Secure Steganography Based on Adaptive Dynamic Sampling |
|
π¦ Artifact |
||
| Quantifying Large Language Model Attacks Through the Lens of Model Cognition |
|
|
π¦ Artifact π Appendix |
|
| Quorus: Efficient, Scalable Threshold ML-DSA Signatures from MPC |
|
|
|
π¦ Artifact π Appendix |
| RBOOT: Accelerating Homomorphic Neural Network Inference by Fusing ReLU within Bootstrapping |
|
π¦ Artifact |
||
| Residual-PAC Privacy: Automatic Privacy Control Beyond the Gaussian Barrier |
|
π¦ Artifact |
||
| Revealing the Dark Side of Smart Accounts: An Empirical Study of EIP-7702 Incurred Risks in Blockchain Ecosystem |
|
π¦ Artifact |
||
| SMASH: Scalable Maliciously Secure Hybrid Multi-party Computation Framework for Privacy-Preserving Large Language Models |
|
π¦ Artifact |
||
| SafeFFI: Efficient Sanitization at the Boundary Between Safe and Unsafe Code in Rust and Mixed-Language Applications |
|
|
π¦ Artifact π Appendix |
|
| Scribe: Low-memory SNARKs via Read-Write Streaming |
|
π¦ Artifact |
||
| Secure Protocol Composition under Dynamic Corruption: Models and Proofs |
|
|
|
π¦ Artifact π Appendix |
| Security and Privacy Analysis of Tileβs Location Tracking Protocol |
|
π¦ Artifact |
||
| Semantics Over Syntax: Uncovering Pre-Authentication 5G Baseband Vulnerabilities |
|
|
|
π¦ Artifact π Appendix |
| Shadowfax: Hybrid Security and Deniability for AKEMs |
|
|
|
π¦ Artifact π Appendix |
| Shred-to-Shine Metamorphosis of (Distributed) Polynomial Commitments |
|
|
|
π¦ Artifact π Appendix |
| Side-Channel Attacks on Open vSwitch |
|
|
π¦ Artifact π Appendix |
|
| Silicon Heist: (Ransom) Attacks for Cloud FPGAs via Privilege Escalation |
|
π¦ Artifact |
||
| Sirens Whisper: Inaudible Near-Ultrasonic Jailbreaks of Speech-Driven LLMs |
|
π¦ Artifact |
||
| Sliding into the Flight Deckβs DMs: Practical Message Attacks on CPDLC |
|
π¦ Artifact |
||
| SoK: PHILTER: Uncovering Security and Functional Gaps in AI-based Phishing Website Detection Literature via an LLM-based Reasoning Framework |
|
π¦ Artifact |
||
| SoK: Security of Cyber-physical Systems Under Intentional Electromagnetic Interference Attacks |
|
π¦ Artifact |
||
| SophOMR: Improved Oblivious Message Retrieval from SIMD-Aware Homomorphic Compression |
|
|
|
π¦ Artifact π Appendix |
| Source Code: Assumption-Free Fuzzy PSI via Predicate Encryption |
|
π¦ Artifact |
||
| Static Detection of TOCTOU Bugs Caused by Kernel Races |
|
π¦ Artifact |
||
| Streaming Function Secret Sharing and Its Applications |
|
π¦ Artifact |
||
| Sy-FAR: Symmetry-based Fair Adversarial Robustness |
|
π¦ Artifact |
||
| TAT: Attesting Trajectory Integrity of Industrial Robotic Arms |
|
π¦ Artifact |
||
| TIMESLICE-SANDWICH: A GPU Side-Channel Attack Exploiting Time-Sliced Scheduling |
|
π¦ Artifact |
||
| The Adverse Effects of Omitting Records in Differential Privacy: How Sampling and Suppression Degrade the PrivacyβUtility Tradeoff (USENIX Security 2026 Artifact) |
|
|
|
π¦ Artifact π Appendix |
| The Art of Hide and Seek: Making Pickle-Based Model Supply Chain Poisoning Stealthy Again |
|
π¦ Artifact |
||
| The Prompt Stealing Fallacy: Rethinking Metrics, Attacks, and Defenses |
|
π¦ Artifact |
||
| The State of Passkeys: Studying the Adoption and Security of Passkeys on the Web |
|
|
|
π¦ Artifact π Appendix |
| TopFeaRe: Locating Critical State of Adversarial Resilience for Graphs Regarding Topology-Feature Entanglement |
|
π¦ Artifact |
||
| Tracegram: Framing Trace-Level Traffic Analysis with Temporally-Aware Multiple Instance Learning |
|
π¦ Artifact |
||
| Transparent Dictionaries from Polynomial Commitments |
|
π¦ Artifact |
||
| TrojPix: Electromagnetic Covert Channels via Imperceptible Pixel Modulation |
|
π¦ Artifact |
||
| Trustworthy and Confidential SBOM Exchange |
|
|
|
π¦ Artifacts: 1, 2 π Appendix |
| Turn Your Face Into An Attack Surface: Screen Attack Using Facial Reflections in Video Conferencing |
|
π¦ Artifact |
||
| Unbalanced Fuzzy Private Set Intersection for $L_{\infty}$ Distance: Achieving Sublinear Communication with Large Set Size |
|
π¦ Artifact |
||
| United We Defend: Collaborative Membership Inference Defenses in Federated Learning |
|
|
π¦ Artifact π Appendix |
|
| Unlocking the True Potential of Decryption Failure Oracles: A Hybrid Adaptive-LDPC Attack on ML-KEM Using Imperfect Oracles |
|
π¦ Artifact |
||
| VSG-Safe: Spotting NSFW Video through Cross-Frame Evidence |
|
π¦ Artifact |
||
| VeCT: Secure and Efficient Constant-Time Code Rewriting with Vector Extensions |
|
|
|
π¦ Artifact π Appendix |
| ViPer Strike: Defeating Visual Reasoning CAPTCHAs via Structured VisionβLanguage Inference |
|
π¦ Artifact |
||
| VidLeaks: Membership Inference Attacks Against Text-to-Video Models |
|
π¦ Artifact |
||
| VΞ΅rity: Verifiable Local Differential Privacy |
|
π¦ Artifact |
||
| WAVED: Principled Identification of Off-Path Exploitable Weak Verifications within the TCP/IP Protocol Suite |
|
|
|
π¦ Artifact π Appendix |
| WILD Attack: Stealthy Undermining of Wi-Fi-Based Geolocation Through Remote Crowdsourced Data Injection |
|
π¦ Artifact |
||
| When Fun Turns Toxic: A First Look at Aggressive Advertising in Mini-games |
|
π¦ Artifact |
||
| When Updates Backfire: A Black-Box Security Analysis of Desktop Software Update Mechanisms |
|
π¦ Artifact |
||
| Why Johnny Adopts Identity-Based Software Signing: A Usability Case Study of Sigstore |
|
π¦ Artifact |
||
| Window-based Membership Inference Attacks Against Fine-tuned Large Language Models |
|
π¦ Artifact |
||
| XGuardian: Towards Explainable and Generalized AI Anti-Cheat on FPS Games |
|
|
|
π¦ Artifact |
| You Know Why, but Still Rely: The Impact of Explainable AI on Trust, Task Load, and Performance in Cybersecurity Decision-Making |
|
π¦ Artifacts: 1, 2, 3, 4 |
||
| ZipPIR: High-throughput Single-server PIR without Client-side Storage |
|
|
|
π¦ Artifact π Appendix |
| kSFS: Repurposing a Microkernel-like Interface for Fast and Secure In-Kernel Linux File Systems |
|
|
|
π¦ Artifact π Appendix |
| mmCipher: Batching Post-Quantum Public Key Encryption Made Bandwidth-Optimal |
|
|
|
π¦ Artifact π Appendix |
| vCause: Efficient and Verifiable Causality Analysis for Cloud-based Endpoint Auditing |
|
π¦ Artifact |